StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

E-Business security in your organisation - Essay Example

Cite this document
Summary
My current company does not have an e-business initiative, so this evaluation is on e-gold, one of the online merchants with which this writer is familiar. Before conducting an evaluation of its e-business security, we begin with an outline of how e-gold operates.
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
E-Business security in your organisation
Read Text Preview

Extract of sample "E-Business security in your organisation"

Download file to see previous pages

It has over 3 million accounts, a quarter of which are active, and has total assets of $61 million (e-gold 4). For a decade-long company, it has not grown much compared to the largest online payment system, Paypal, which claims to do $60 million worth of transactions daily. e-gold transactions are 100 percent backed by metal deposits and are not reversible, which means that unlike credit card transactions, once a transaction is made there is no possibility that it can be cancelled. e-gold can be used to pay for transactions over other merchant websites and makes its money from maintenance fees that range up to 1 percent of the total transaction amount.

Based on personal experience, the website is easy to use, getting an account is fast, and the fees are reasonable. The website (www.e-gold.com) is open 24/7 so account holders can transact anytime and anywhere. Users avail of e-gold for several types of transactions. They can have funds transferred to their e-gold account, and then have it transferred to a bank account in any currency using a reliable third party site like OmniPay or The Gold Shop. A user does this by simply logging on to a personal e-gold account, "spend" the desired amount (say, $1,000 worth of e-gold) into OmniPay, take note of the spend batch number issued for the transaction, log out of e-gold, log in to OmniPay, and fill up a bank transfer form with instructions to OmniPay to transfer the $1,000 that was "spent" or sold less fees to any bank account anywhere in the world.

The funds take anywhere from two to five days to reach the bank account.Users normally tested the system by transferring small amounts, and when it worked they began moving bigger amounts of money. When someone anywhere in the world wants to pay an e-gold account holder, they give instructions to pay via e-gold by buying the e-currency and "spending" the amount to the user's account. The user can check his or her e-gold account from anywhere, even from a hot spot on a beach resort in the French Riviera, so they will know whether the payments have gone through or the funds have been transferred to the specified bank account.

The user can then do transactions from there.This writer has been using e-gold for over a year now, and is happy with the service. This is the reason why this analysis on e-business security was done on this company, which has been only too happy to oblige and share information with me for this paper.Choosing the StandardOne problem with selecting a standard to evaluate the e-business security issues of a merchant website is that there are too many standards to choose from. The main reason is simple: the chosen standard becomes a cash flow machine for the firm that develops it.

There are several companies like Verisign, Oracle, IBM, and a host of other for-profit and not-for-profit institutions known by their acronyms: SEI, IETF, NIST, W3C, SAI, ISACA. The list is seemingly endless.The Europe-based International Organization of Standards is known for its ISO standards, the more famous of which are the ISO 9000 series used by companies to document their total quality management programs (Arnold 15). The letters ISO/IEC prefix its standards, which are adopted in both the U.S. and Europe.

The British Standards Institute (BSI) is a similar organization that has several years of experience developing working standards for many industries.For these

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“E-Business security in your organisation Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
E-Business security in your organisation Essay Example | Topics and Well Written Essays - 3000 words. Retrieved from https://studentshare.org/miscellaneous/1510993-e-business-security-in-your-organisation
(E-Business Security in Your Organisation Essay Example | Topics and Well Written Essays - 3000 Words)
E-Business Security in Your Organisation Essay Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/miscellaneous/1510993-e-business-security-in-your-organisation.
“E-Business Security in Your Organisation Essay Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/miscellaneous/1510993-e-business-security-in-your-organisation.
  • Cited: 0 times

CHECK THESE SAMPLES OF E-Business security in your organisation

Network Security Fundamentals, Security Threats, and Issues

NETWORK security FUNDAMENTALS, security THREATS, AND ISSUES Network security Fundamentals, security Threats, and Issues Author Author's Affiliation Date 3.... Network Firewalls security consists of tools, technologies, measures and laws used to ensure the safety of resources.... hellip; At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet....
4 Pages (1000 words) Case Study

Network Security

Detailed Network Security Recommendations A firewall is the first line of defense for your network.... The Internet has become a staple of the business world today It is because of this that a company should remain continually up to date with the latest security measures.... ulnerabilities due to designs flaws,poor security management can contribute to the loss of company assets… With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity....
3 Pages (750 words) Case Study

Security Administration and Management

According to Johnson & Scholes (2007), organisational culture is a tool in management strategic armory which appears to be invisible yet it influences "why" "how" "what" and "when" things are done in an organisation or "it is the way things are being done here" (Johnson & Scholes 2007:66 ... rom our analysis, by focusing on differentiation strategies in the security industry, Securitas AB success can be attributed to its vast experience in the market, product differentiation, and assorted brands....
14 Pages (3500 words) Essay

IPad's Security Breach

The author of the paper "iPad's security Breach" touches upon the idea of security of "iProducts".... As the text has it, controversy hit Apple's iPad or more specifically the iPad's cellular network, AT&T as a security research company, Goatse security pointed out a flaw in the security system.... nbsp;… Goatse security reported to Gawker that using a script available at AT&T's website, they were able to hack into the iPad and retrieve email addresses of possibly 11,4000 people including top celebrities, politicians, media personalities and also military personnel....
5 Pages (1250 words) Research Paper

Business Plan Project for a Security Guard Company SecureIT

The company SecureIT deals with the provision of security guards to different business premises with the aim of boosting security in the wake of terrorist threats.... The study describes the business plan project for a security guard company SecureIT.... hellip; The company aimed at providing quality security services that will cover the provision of guards to different premises, conducting private investigations and the provision of consultancy services to the customers....
9 Pages (2250 words) Case Study

Compilation of Security Data Issues

The paper 'Compilation of security Data Issues' focuses on data security issues.... The paper is a compilation of ten security data issues.... Data security means safeguarding data, like a database, from disparaging forces, and from the undesired actions of unauthorized personnel.... hellip; The author states that unauthorized access to data is one of the data security issues affecting businesses.... Most organizations and businesses implement numerous forms of security by enforcing hardware remedies such as firewalls and routers....
12 Pages (3000 words) Report

Network Security in the Organization

This report "Network security in the Organization" presents data plane security that encompasses the actual packets that carry customer traffic.... In contrast to the control plane, traffic on the data plane just goes through network devices and is not destined for any of the interfaces on the device....
10 Pages (2500 words) Report

Foundations of Business Computing - Web-Based Collaboration

The author of this paper "Foundations of Business Computing - Web-Based Collaboration" will make an earnest attempt to describe the reasons why organizations are choosing to out-source business activities and define and contrast technology, information technology, and information system.... hellip; There are several advantages of using databases that include the following: ...
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us